SlideShare a Scribd company logo
Sustainability of HIEs under Cyber Security
The CERT Symposium on Cyber Security Incident
Management for Health Information Exchanges
Carnegie Mellon University's Posner Center
Pittsburgh, Pennsylvania
June 26, 2013
William “Buddy” Gillespie
Chair Business, Health Outcomes & HIE Committee, PAeHI
Director of HealthCare Solutions
Distributed Systems Services (DSS)
wgillespie@dsscorp.com
Sustainability of HIEs under Cyber Security
Agenda
• HIE Overview
• The Problem
• Concerns/Trends/HIMSS Survey
• Guidelines
• Architecture
• Medical Devices/Robotic Surgery
• Best Practices
• Future
HIE - Seven Sustainability Strategies
1 • Innovative stakeholder negotiations
2 • Building the right relations hospitals & payers
3 • Physician adoption as driver of sustainability
4 • Innovation to bring payers/providers together
5 • Innovative sources for fee income
6 • Stake Holders drive healthcare transformation
7 • Cyber Security Best Practice
Health Information Exchange
Services Provided
Majority Provide
• Clinical messaging
and Inquiry (CCD)
• PH Dept. reportable
conditions or
Immunization
Registry
Most Provide
• Had or planning
eRX, orders,
physician workflow
tools
• Six of 11 had or
planning low-cost,
Web-based certified
EHRS that meets
Meaningful Use
Unique Services
• INHS (WA) offers
shared IT services to
38 hospitals plus
majority of
physicians; others
use Virtual Private
Network
• MiHIN Resource
Services plans to
implement 7 sub-
state HIEs over 18
months.
HIE Cyber Security -The Problem
“Not only do medical EHR systems themselves pose security
risks, but the movement towards making patient data available
wherever they may access medical services, implemented
through participation in health information exchanges (HIEs),
exacerbates the level of risk by posing additional threat
vulnerabilities. HIEs face funding challenges due to the fact that
they lack clear-cut and profitable business models, and yet
federal grants and deadlines maintain a level of time pressure
for implementing these systems that do not allow for thorough
considerations of security………..”
Doug Pollack, strategy officer at ID Experts, responsible for strategy and innovation including prevention
analysis and response services. As a veteran in the technology industry, he has over 25 years of experience in computer
systems, software, and security concerns focusing on creating successful new products in new emerging markets.
HIE Cyber Security -The Problem
HIE
HIE Cyber Security -
Comparing HIE Models & Cyber Security
Integrated delivery
networks (IDNs)
•Organized by one Institution
•Hospital to connect its
physicians & provider partners
& ensures that hospitals and
physicians can participate in
Meaningful Use Incentive
•Costs are absorbed by
Institution & Hospital vendors
set up networks
•Examples: Pinnacle Health
System and Doylestown
Hospital
Community/Regional HIE
•Organized around one or more
medical referral regions with a
multi-stakeholder governing
body
•Fees are paid by the
stakeholders based on benefits
received & startup funding
coming from key stakeholders
or outside funding sources
(grants)
•Examples: Geisinger’s KeyHIE
and UPMC’s HIE are blended
IDN/Regional HIEs.
State-level HIE
• State geographic boundaries
• Responsible for addressing
barriers to HIE adoption
around privacy and security,
standards, and legal issues
with bordering states
• Funded by federal
government to include state
agencies such as Medicaid
and Public Health
• Example: Designation of a
state-level HIE in
Pennsylvania
PAeHI Research Studies and White Papers
Establishing
widespread
adoption of
electronic health
records and
electronic
prescribing in
Pennsylvania
(2008)
Ensuring privacy
and security of
Health Information
Exchange in
Pennsylvania
(2009)
Building a
Sustainable Model
for Health
Information
Exchange in
Pennsylvania
(2009)
Financing Research
and Framework
Development for a
Health Information
Exchange (2010)
10
paehi.org
HIE Cyber Security –
Internet Usage
• In 1995, 16 million users (0.4%)
• In 2010, 1.6 billion users (23.5%)
HIE Cyber Attack - Trends
• Increasing sophistication
• Decreasing costs
• Increasing attack frequency
• Difficulties in patching systems
• Increasing network connections, dependencies,
and trust relationships
HIE Cyber Security –
Top Concerns
• Mobile Devices - BYOD
• Medical Devices/Robotic Surgery
• HIPAA & BAAs
• Internal & External Breaches
• Data Leakage
• Limits of Technology & Inadequate Security Systems
• Funding
• Patient’s Lack of Confidence
• Third Parties-Vendors
• Remote Connections
HIE Cyber Security -
Concepts of Information Assurance
• Confidentiality (privacy)
• Integrity (quality, accuracy, relevance)
• Availability (accessibility)
HIE Cyber Security – ONC Guidelines
• New privacy and security guidelines--aimed at protecting the vast
amount of healthcare information transmitted by state Health
Information Exchanges--are now in place.
• HIEs are networks intended to help states manage the electronic
exchange of health information among health care providers and
hospitals within their states and across state lines.
• Privacy and security policies are required as a condition of
accepting part of the $550 million federal grant money funding the
development of state-based HIEs.
“The guidelines, issued by the Office of the National Coordinator
for Health IT (ONC), provide a common set of "rules of the road"
designed to build confidence in the system on both the provider
and patient level”…….. ONC
HIE Cyber Security – ONC Guidelines
• Under the new guidelines, state HIE grantees are
required to develop privacy and security policies
to address each of the fair information practice
principles as outlined by ONC.
• The principles include individual access to
information; the right to correct errors; openness
and transparency; collection, use and disclosure
limitations; security safeguards; data quality and
integrity; individual choice; and accountability.
HIE Cyber Security – ONC Guidelines
• The ONC also noted that there was no "one size fits all"
approach when developing policy for HIEs.
– For example, some state HIEs merely serve as information
conduits, ensuring the secure exchange of identifiable
health information among health care providers, without
accessing or storing any of that data. This type of HIE
doesn't have to worry about data quality or providing
individuals access to copies of their health information or
to have errors corrected or noted.
– However, state HIEs that "store, assemble, or aggregate"
identifiable health information are required to develop
policies to address all of the fair information practices,
including data quality, individual access and the right to
correct errors
HIE Cyber Security – ONC Guidelines
• If an HIE's current privacy and security policies
don't comply with the new requirements and
guidance, they have to be rewritten and a
timeline for making those changes given to the
ONC.
• The new requirements are consistent with the
recommendations developed and issued by the
Privacy and Security Tiger Team of the Federal
Health IT Policy Committee.
HIE Cyber Security –
Privacy & Security Policies
• All of the information that passes through the
HIE is password protected and encrypted at its
source using state of the art tools to protect
the transmission and security of the data.
• Access to the network is monitored and
restricted to only those qualified medical
professionals who have demonstrated a need
to know the requested information.
HIE Cyber Security –
Security Architecture
• The secure exchange of electronic health information is
important to the development of electronic health records
(EHRs) and to the improvement of the U.S. healthcare system.
• While the U.S. healthcare system is widely recognized as one
of the most clinically advanced in the world, costs continue to
rise, and often preventable medical errors occur.
• Health information technology (HIT), especially the
development of electronic health records for use in both
inpatient and ambulatory care settings, has the potential for
providing reliable access to health information and thereby
improving the healthcare system. However, the prospect of
storing, moving, and sharing health information in electronic
formats raises new challenges on how to ensure that the data
is adequately protected.
HIE Cyber Security –
NHIN Security Architecture
• Protecting electronic patient health information is crucial to
developing systems and structures that support the exchange
of that information among healthcare providers, payers, and
consumers using Health Information Exchanges (HIEs).
• As noted in the Summary of the Nationwide Health
Information Network (NHIN) report from the Office of the
National Coordinator, "An important core competency of the
HIE is to maintain a trusting and supportive relationship with
the organizations that provide data to, and retrieve data from,
one another through the HIE. The trust requirement is met
through a combination of legal agreements, advocacy, and
technology for ensuring meaningful information interchange
in a way that has appropriate protections."
HIE Cyber Security –
NIST Security Architecture
• NIST published "Security Architecture Design Process for
Health Information Exchanges (HIEs) (NISTIR 7497)" in
September 2010, to provide a systematic approach to
designing a technical security architecture for the exchange
of health information that leverages common government
and commercial practices and that demonstrates how
these practices can be applied to the development of HIEs.
• The publication assists organizations in ensuring that data
protection is adequately addressed throughout the system
development life cycle, and that these data protection
mechanisms are applied when the organization develops
technologies that enable the exchange of health
information.
HIE Cyber Security –
Security Architecture
• The operating model outlined in the NIST
publication will help organizations that are
implementing HIEs to:
– Understand major regulations and business drivers.
– Identify cross-organizational enabling services.
– Define supporting business processes (for each
service).
– Develop notional architectures (as a blueprint to
support services, processes, and the selection of
technical solutions).
– Select technical solutions.
HIE Cyber Security –
Medical Devices/Robotic Surgery
• Summary of Problem and Scope:
– Many medical devices contain configurable
embedded computer systems that can be
vulnerable to cyber security breaches.
– In addition, as medical devices are increasingly
interconnected, via the Internet, hospital
networks, other medical device, and
smartphones, there is an increased risk of cyber
security breaches, which could affect how a
medical device operates
HIE Cyber Security –
Medical Devices/Robotic Surgery
• General Principles
– Manufacturers should develop a set of security
controls to assure medical device cyber security to
maintain information confidentiality, integrity,
and availability.
HIE Cyber Security –
Medical Devices - FDA
• On June 13, 2013, in response to increased reports of computer viruses
and other cyber security breaches concerning medical devices and
hospital networks, the Food and Drug Administration (FDA) issued a
safety communication on cyber security for medical devices and hospital
networks and a new draft guidance document, "Content of Premarket
Submissions for Management of Cyber security in Medical Devices."
– As software has become increasingly prevalent in medical devices, allowing
for more sophisticated uses and networked connectivity, the cyber security
risks for these devices also have increased.
– Recognizing that these risks may impact device performance and safety, FDA
clarified that device manufacturers are responsible for identifying and
mitigating cyber security risks for their medical device products.
– Although the new draft guidance makes clear that FDA expects device
manufacturers to evaluate and address these issues for new devices going
forward, questions remain as to the extent of manufacturers' obligations for
cyber security risks affecting older devices, particularly with respect to
discontinued devices that are still in use but are no longer supported by a
device manufacturer.
HIE Cyber Security –
Medical Devices - FDA
• FDA acknowledges that the extent of security controls will
depend on the medical device, its use environment, and
the risks presented to patients by a potential security
breach, the draft guidance includes several general
recommendations.
– Manufacturers are encouraged to justify, in their submissions,
the security controls chosen, including the following:
• limiting access to trusted users only, particularly for life-sustaining
devices or devices that could be directly connected to hospital
networks;
• ensuring the trusted content of software by restricting software and
firmware updates to authenticated code, using systematic procedures
for authorized users to download the manufacturer's software and
firmware, and ensuring secure data transfer to and from the device;
• using "fail safe" modes to maintain a device's critical functionality,
even when the device's security has been compromised.
HIE Cyber Security –
Medical Devices - FDA
• FDA recommends that manufacturers include the
following with their submissions:
– Hazard analysis, mitigations, and design considerations to
identify and control cyber security risks; a traceability
matrix linking actual cyber security controls to the risks
considered;
– A systematic plan for providing validated updates and
patches to operating systems or software to update the
protections;
– Documentation to demonstrate that the device will be
provided free of malware to purchasers and users; and
– Instructions for use and specifications related to antivirus
software and/or firewall use appropriate for the device
and its use environment.
HIE Cyber Security –
Medical Devices
• Cyber Security risk analysis and management plan as
part of the risk analysis required by 21 CFR 820.30(g):
• Identification of assets, threats, and vulnerabilities;
• Impact assessment of the threats and vulnerabilities on
device functionality;
• Assessment of the likelihood of a threat and of a
vulnerability being exploited;
• Determination of risk levels and suitable mitigation
strategies;
• Residual risk assessment and risk acceptance criteria.
HIE Cyber Security –
FDA Recommendations for HIEs
• Restricting unauthorized access to the
network and networked medical devices.
• Making certain appropriate antivirus software
and firewalls are up-to-date.
• Monitoring network activity for unauthorized
use.
HIE Cyber Security –
FDA Recommendations for HIEs
• Protecting individual network components through
routine and periodic evaluation, including updating
security patches and disabling all unnecessary ports
and services.
• Contacting the specific device manufacturer if you
think you may have a cyber security problem related to
a medical device. If you are unable to determine the
manufacturer or cannot contact the manufacturer, the
FDA and DHS ICS-CERT may be able to assist in
vulnerability reporting and resolution.
• Developing and evaluating strategies to maintain
critical functionality during adverse conditions.
HIE Cyber Security –
FDA Recommendations for HIEs
• Protecting individual network components through
routine and periodic evaluation, including updating
security patches and disabling all unnecessary ports
and services.
• Contacting the specific device manufacturer if you
think you may have a cyber security problem related to
a medical device. If you are unable to determine the
manufacturer or cannot contact the manufacturer, the
FDA and DHS ICS-CERT may be able to assist in
vulnerability reporting and resolution.
• Developing and evaluating strategies to maintain
critical functionality during adverse conditions.
HIE Cyber Security –
ICS-CERT
• What is ICS-CERT?
– The Industrial Control Systems Cyber Emergency Response Team
(ICS-CERT) provides a control system security focus in
collaboration with US-CERT to:
• Conduct vulnerability and malware analysis
• Provide onsite support for incident response and forensic
analysis
• Provide situational awareness in the form of actionable
intelligence
• Coordinate the responsible disclosure of
vulnerabilities/mitigations
• Share and coordinate vulnerability information and threat
analysis through information products and alerts.
HIE Cyber Security –
Best Practices
• Best Practices for Technology Environment
– Configuration Management
– Software Maintenance
– Operating Maintenance
• Mobile Device Management (BYOD)
• Security Culture
• Backup and DR
• Checklists and ITSM for all Elements
HIE Cyber Security –
Best Practices
• Passwords & Strong Authentication
• Anti-Virus Software
• Firewall(s)
• Controlled Access to PHI
• Controlled Physical Access
• Limit Network Access
• Plan for the Unexpected
HIE Cyber Security –
The Next Frontier
• Accountable Care Organizations (ACOs)
• Direct-HISPs
• Cloud Hosting
• Meaningful Use-Stage 2 and 3
• HIPAA Omnibus Bill
HIE Cyber Security –
Expert Opinion
Camillla Hull Brown, Principal, Strategies for Tomorrow, Inc.
(sftvision.com)
“Cyber Security opens the doors for HIEs to cross geographic
boundaries if they successfully address Security issues in the
minds of users and participating organizations. Combined with
data exchange standards, this has the potential for some HIEs
to expand nationally establishing sustainability through
volume. Private, local or regional HIEs can thrive by accessing
additional data from the national HIEs while providing services
tailored to the needs of the local system or region. Put remote
devices in the hands of clinicians and patients, and the
benefits can be exponential. It's the think global, act local
concept”.
HIE Cyber Security –
Reference Sites
HHS Office for Civil Rights website
(http://www.hhs.gov/ocr/privacy/hipaa/understanding/)
NIST 800 Series Special Publications (http://csrc.nist.gov/publications/PubsSPs.html) In
particular:
• NIST SP 800-36 Guide to Selecting Information Technology Security Products
• NIST SP 800-53 Recommended Security Controls for Federal Information Systems and
Organizations
• NIST SP 800-66 An Introductory Resource Guide for Implementing the Health
Insurance Portability and Accountability Act (HIPAA) Security Rule
• NIST SP 800-88 Guidelines for Media Sanitization
• NIST SP 800-111 Guide to Storage Encryption Technologies for End User Devices
• NIST SP 800-114 User's Guide to Securing External Devices for Telework and
Remote Access
• NIST SP 800-124 Guidelines on Cell Phone and PDA Security
44
HIE Cyber Security –
Reference Sites
CYBER SECURITY Guide
The protection of data and systems in networks that connect to the
Internet
10 Best Practices
http://nyehealth.org/wp-content/uploads/2012/07/ONC_Cyber-
Security-Guide-V-1.0.pdf
Click to edit Master title style
Thank youThank you
Healthcare Solutions & Overview
William “Buddy” Gillespie
www.dsscorp.com
wgillespie@dsscorp.com
Discussion

More Related Content

What's hot

Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in Cyberspace
RightPatient®
 
HIPAA Compliance: Simple Steps to the Healthcare Cloud
HIPAA Compliance: Simple Steps to the Healthcare CloudHIPAA Compliance: Simple Steps to the Healthcare Cloud
HIPAA Compliance: Simple Steps to the Healthcare CloudHostway|HOSTING
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
MBMeHealthCareSolutions
 
Hip hiu policy
Hip hiu policyHip hiu policy
Hip hiu policy
Manish Nachnani
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
Health IT Conference – iHT2
 
hitmpresentation06262013
hitmpresentation06262013hitmpresentation06262013
hitmpresentation06262013Kim Paull
 
Health data - Is it safe?
Health data - Is it safe?Health data - Is it safe?
Health data - Is it safe?
Alex Beisser MBCS
 
The Internet of Healthy Things (IoHT) for Healthcare Organizations Webinar
The Internet of Healthy Things (IoHT) for Healthcare Organizations WebinarThe Internet of Healthy Things (IoHT) for Healthcare Organizations Webinar
The Internet of Healthy Things (IoHT) for Healthcare Organizations Webinar
Todd Winey
 
hitech act
hitech acthitech act
hitech actpadler01
 
Building a National Health IT System from the Middle Out
Building a National Health IT System from the Middle OutBuilding a National Health IT System from the Middle Out
Building a National Health IT System from the Middle Out
Health Informatics New Zealand
 
HIPAA Audit Implementation
HIPAA Audit ImplementationHIPAA Audit Implementation
HIPAA Audit Implementation
Valency Networks
 
You and HIPAA - Get the Facts
You and HIPAA - Get the FactsYou and HIPAA - Get the Facts
You and HIPAA - Get the Facts
resourceone
 
Cyberinsurance 111006
Cyberinsurance 111006Cyberinsurance 111006
Cyberinsurance 111006
JNicholson
 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simple
Jose Ivan Delgado, Ph.D.
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Health IT Conference – iHT2
 
UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1Bryan Cline, Ph.D.
 
John Picanso - Update on Electronic CVI Data Standards
John Picanso - Update on Electronic CVI Data StandardsJohn Picanso - Update on Electronic CVI Data Standards
John Picanso - Update on Electronic CVI Data Standards
John Blue
 
The mHealth + Telehealth World 2014
The mHealth + Telehealth World 2014The mHealth + Telehealth World 2014
The mHealth + Telehealth World 2014
WorldCongress
 
Information+Integration ? Innovation an HL7/EFMI/HIMSS @eHealthweek2015 in Riga
Information+Integration ? Innovation an HL7/EFMI/HIMSS @eHealthweek2015 in RigaInformation+Integration ? Innovation an HL7/EFMI/HIMSS @eHealthweek2015 in Riga
Information+Integration ? Innovation an HL7/EFMI/HIMSS @eHealthweek2015 in Riga
chronaki
 
Hm 418 harris ch11 ppt
Hm 418 harris ch11 pptHm 418 harris ch11 ppt
Hm 418 harris ch11 ppt
BealCollegeOnline
 

What's hot (20)

Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in Cyberspace
 
HIPAA Compliance: Simple Steps to the Healthcare Cloud
HIPAA Compliance: Simple Steps to the Healthcare CloudHIPAA Compliance: Simple Steps to the Healthcare Cloud
HIPAA Compliance: Simple Steps to the Healthcare Cloud
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
Hip hiu policy
Hip hiu policyHip hiu policy
Hip hiu policy
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
 
hitmpresentation06262013
hitmpresentation06262013hitmpresentation06262013
hitmpresentation06262013
 
Health data - Is it safe?
Health data - Is it safe?Health data - Is it safe?
Health data - Is it safe?
 
The Internet of Healthy Things (IoHT) for Healthcare Organizations Webinar
The Internet of Healthy Things (IoHT) for Healthcare Organizations WebinarThe Internet of Healthy Things (IoHT) for Healthcare Organizations Webinar
The Internet of Healthy Things (IoHT) for Healthcare Organizations Webinar
 
hitech act
hitech acthitech act
hitech act
 
Building a National Health IT System from the Middle Out
Building a National Health IT System from the Middle OutBuilding a National Health IT System from the Middle Out
Building a National Health IT System from the Middle Out
 
HIPAA Audit Implementation
HIPAA Audit ImplementationHIPAA Audit Implementation
HIPAA Audit Implementation
 
You and HIPAA - Get the Facts
You and HIPAA - Get the FactsYou and HIPAA - Get the Facts
You and HIPAA - Get the Facts
 
Cyberinsurance 111006
Cyberinsurance 111006Cyberinsurance 111006
Cyberinsurance 111006
 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simple
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
 
UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1
 
John Picanso - Update on Electronic CVI Data Standards
John Picanso - Update on Electronic CVI Data StandardsJohn Picanso - Update on Electronic CVI Data Standards
John Picanso - Update on Electronic CVI Data Standards
 
The mHealth + Telehealth World 2014
The mHealth + Telehealth World 2014The mHealth + Telehealth World 2014
The mHealth + Telehealth World 2014
 
Information+Integration ? Innovation an HL7/EFMI/HIMSS @eHealthweek2015 in Riga
Information+Integration ? Innovation an HL7/EFMI/HIMSS @eHealthweek2015 in RigaInformation+Integration ? Innovation an HL7/EFMI/HIMSS @eHealthweek2015 in Riga
Information+Integration ? Innovation an HL7/EFMI/HIMSS @eHealthweek2015 in Riga
 
Hm 418 harris ch11 ppt
Hm 418 harris ch11 pptHm 418 harris ch11 ppt
Hm 418 harris ch11 ppt
 

Viewers also liked

Medtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the HorizonMedtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the Horizon
team-WIBU
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
Health IT Conference – iHT2
 
Cyber Security - NAHU Continuing Education Course
Cyber Security - NAHU Continuing Education CourseCyber Security - NAHU Continuing Education Course
Cyber Security - NAHU Continuing Education Course
Scott Diehl
 
Why cyber-criminals target Healthcare - Panda Security
Why cyber-criminals target Healthcare - Panda Security Why cyber-criminals target Healthcare - Panda Security
Why cyber-criminals target Healthcare - Panda Security
Panda Security
 
Healthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected MachinesHealthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected Machines
Kurt Hagerman
 
Webinar: Cybersecurity and the New Age of Hackers
Webinar: Cybersecurity and the New Age of HackersWebinar: Cybersecurity and the New Age of Hackers
Webinar: Cybersecurity and the New Age of Hackers
Modern Healthcare
 
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
U.S. News Healthcare of Tomorrow
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0
grp362
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
Extreme Networks
 
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank Siepmann
Frank Siepmann
 
Securing Medical Devices From Cyber Threats
Securing Medical Devices From Cyber ThreatsSecuring Medical Devices From Cyber Threats
Securing Medical Devices From Cyber Threats
HCL Technologies
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
Andris Soroka
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
Jim Brashear
 
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Steve Fantauzzo
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
Health IT Conference – iHT2
 
Empower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsEmpower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security Skills
ClickSSL
 
Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025
Dr David Probert
 

Viewers also liked (20)

Medtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the HorizonMedtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the Horizon
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
Cyber Security - NAHU Continuing Education Course
Cyber Security - NAHU Continuing Education CourseCyber Security - NAHU Continuing Education Course
Cyber Security - NAHU Continuing Education Course
 
Why cyber-criminals target Healthcare - Panda Security
Why cyber-criminals target Healthcare - Panda Security Why cyber-criminals target Healthcare - Panda Security
Why cyber-criminals target Healthcare - Panda Security
 
Healthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected MachinesHealthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected Machines
 
Webinar: Cybersecurity and the New Age of Hackers
Webinar: Cybersecurity and the New Age of HackersWebinar: Cybersecurity and the New Age of Hackers
Webinar: Cybersecurity and the New Age of Hackers
 
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
 
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank Siepmann
 
Securing Medical Devices From Cyber Threats
Securing Medical Devices From Cyber ThreatsSecuring Medical Devices From Cyber Threats
Securing Medical Devices From Cyber Threats
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
 
Empower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsEmpower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security Skills
 
Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025
 

Similar to Sustainability of HIEs under CyberSecurity

module-8-ppt-session-1 for ehealth (1).pptx
module-8-ppt-session-1 for ehealth (1).pptxmodule-8-ppt-session-1 for ehealth (1).pptx
module-8-ppt-session-1 for ehealth (1).pptx
ssuser2714fe
 
Unit VI Case StudyAnimal use in toxicity testing has long been .docx
Unit VI Case StudyAnimal use in toxicity testing has long been .docxUnit VI Case StudyAnimal use in toxicity testing has long been .docx
Unit VI Case StudyAnimal use in toxicity testing has long been .docx
dickonsondorris
 
E-health appications
E-health appicationsE-health appications
E-health appications
Ankita Kunwar
 
ELECTRONIC HEALTH RECORD SYSTEMS:
ELECTRONIC HEALTH RECORD SYSTEMS:ELECTRONIC HEALTH RECORD SYSTEMS:
ELECTRONIC HEALTH RECORD SYSTEMS:
Mirasolmanginyog
 
Healthcare Nous InfoSystem
Healthcare Nous InfoSystemHealthcare Nous InfoSystem
Healthcare Nous InfoSystem
Ujjwal Anand
 
Importance of RWD in HEOR: An Industrial Perspective
Importance of RWD in HEOR: An Industrial PerspectiveImportance of RWD in HEOR: An Industrial Perspective
Importance of RWD in HEOR: An Industrial Perspective
MarksMan Healthcare Communications
 
Mha 690 discussion 2 Seynabou
Mha 690 discussion 2 SeynabouMha 690 discussion 2 Seynabou
Mha 690 discussion 2 Seynabou
Seynaboundiaye
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health Records
MEASURE Evaluation
 
Aami hitech mu impact on the future on HC IT
Aami hitech mu impact on the future on HC ITAami hitech mu impact on the future on HC IT
Aami hitech mu impact on the future on HC IT
Amy Stowers
 
Shaping a brighter future advancements in health it ccg submission
Shaping a brighter future advancements in health it ccg submissionShaping a brighter future advancements in health it ccg submission
Shaping a brighter future advancements in health it ccg submissionCareer Communications Group
 
DVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PADVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PA
William Buddy Gillespie ITIL Certified
 
National E-health
National E-healthNational E-health
National E-health
Steve Iduye
 
Blockchain2[1].pptx
Blockchain2[1].pptxBlockchain2[1].pptx
Blockchain2[1].pptx
koretamirat
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla borokayla_ann_30
 
Healthcare Information Exchange.pdf
Healthcare Information Exchange.pdfHealthcare Information Exchange.pdf
Healthcare Information Exchange.pdf
LarisaAlbanians
 
Mikhaela ripa
Mikhaela ripaMikhaela ripa
Mikhaela ripa
emerosegal
 
The Health Information Governance Framework
The Health Information Governance FrameworkThe Health Information Governance Framework
The Health Information Governance Framework
Health Informatics New Zealand
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?
M2SYS Technology
 
HIPAA-HITECH-MU Simplified
HIPAA-HITECH-MU SimplifiedHIPAA-HITECH-MU Simplified
HIPAA-HITECH-MU SimplifiedGretchen Husted
 

Similar to Sustainability of HIEs under CyberSecurity (20)

module-8-ppt-session-1 for ehealth (1).pptx
module-8-ppt-session-1 for ehealth (1).pptxmodule-8-ppt-session-1 for ehealth (1).pptx
module-8-ppt-session-1 for ehealth (1).pptx
 
Unit VI Case StudyAnimal use in toxicity testing has long been .docx
Unit VI Case StudyAnimal use in toxicity testing has long been .docxUnit VI Case StudyAnimal use in toxicity testing has long been .docx
Unit VI Case StudyAnimal use in toxicity testing has long been .docx
 
E-health appications
E-health appicationsE-health appications
E-health appications
 
ELECTRONIC HEALTH RECORD SYSTEMS:
ELECTRONIC HEALTH RECORD SYSTEMS:ELECTRONIC HEALTH RECORD SYSTEMS:
ELECTRONIC HEALTH RECORD SYSTEMS:
 
Healthcare Nous InfoSystem
Healthcare Nous InfoSystemHealthcare Nous InfoSystem
Healthcare Nous InfoSystem
 
Importance of RWD in HEOR: An Industrial Perspective
Importance of RWD in HEOR: An Industrial PerspectiveImportance of RWD in HEOR: An Industrial Perspective
Importance of RWD in HEOR: An Industrial Perspective
 
Dr Roblee
Dr RobleeDr Roblee
Dr Roblee
 
Mha 690 discussion 2 Seynabou
Mha 690 discussion 2 SeynabouMha 690 discussion 2 Seynabou
Mha 690 discussion 2 Seynabou
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health Records
 
Aami hitech mu impact on the future on HC IT
Aami hitech mu impact on the future on HC ITAami hitech mu impact on the future on HC IT
Aami hitech mu impact on the future on HC IT
 
Shaping a brighter future advancements in health it ccg submission
Shaping a brighter future advancements in health it ccg submissionShaping a brighter future advancements in health it ccg submission
Shaping a brighter future advancements in health it ccg submission
 
DVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PADVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PA
 
National E-health
National E-healthNational E-health
National E-health
 
Blockchain2[1].pptx
Blockchain2[1].pptxBlockchain2[1].pptx
Blockchain2[1].pptx
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
 
Healthcare Information Exchange.pdf
Healthcare Information Exchange.pdfHealthcare Information Exchange.pdf
Healthcare Information Exchange.pdf
 
Mikhaela ripa
Mikhaela ripaMikhaela ripa
Mikhaela ripa
 
The Health Information Governance Framework
The Health Information Governance FrameworkThe Health Information Governance Framework
The Health Information Governance Framework
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?
 
HIPAA-HITECH-MU Simplified
HIPAA-HITECH-MU SimplifiedHIPAA-HITECH-MU Simplified
HIPAA-HITECH-MU Simplified
 

More from William Buddy Gillespie ITIL Certified

Healthcare Highlights: HIT Drivers and Trends
Healthcare Highlights: HIT Drivers and TrendsHealthcare Highlights: HIT Drivers and Trends
Healthcare Highlights: HIT Drivers and Trends
William Buddy Gillespie ITIL Certified
 
ITIL and Service Management
ITIL and Service ManagementITIL and Service Management
ITIL and Service Management
William Buddy Gillespie ITIL Certified
 
HITECH-Meaningful Use and the Benefits of the PMI and ITIL Relationship
HITECH-Meaningful Use and the Benefits of the PMI and ITIL RelationshipHITECH-Meaningful Use and the Benefits of the PMI and ITIL Relationship
HITECH-Meaningful Use and the Benefits of the PMI and ITIL Relationship
William Buddy Gillespie ITIL Certified
 
Electronic Medical Records and Meaningful Use
Electronic Medical Records and Meaningful UseElectronic Medical Records and Meaningful Use
Electronic Medical Records and Meaningful Use
William Buddy Gillespie ITIL Certified
 
Can HIEs Really Achieve Financial Sustainability: A Case Study and Discussion...
Can HIEs Really Achieve Financial Sustainability: A Case Study and Discussion...Can HIEs Really Achieve Financial Sustainability: A Case Study and Discussion...
Can HIEs Really Achieve Financial Sustainability: A Case Study and Discussion...
William Buddy Gillespie ITIL Certified
 
Meaningful Use Forecast: Cloud Computing and Disaster Preparedness
Meaningful Use Forecast: Cloud Computing and Disaster PreparednessMeaningful Use Forecast: Cloud Computing and Disaster Preparedness
Meaningful Use Forecast: Cloud Computing and Disaster Preparedness
William Buddy Gillespie ITIL Certified
 
Mobility Management in Healthcare: MDM, BYOD, mHealth
Mobility Management in Healthcare: MDM, BYOD, mHealthMobility Management in Healthcare: MDM, BYOD, mHealth
Mobility Management in Healthcare: MDM, BYOD, mHealth
William Buddy Gillespie ITIL Certified
 
Pleasing Patients through Coordination of Services
Pleasing Patients through Coordination of ServicesPleasing Patients through Coordination of Services
Pleasing Patients through Coordination of Services
William Buddy Gillespie ITIL Certified
 

More from William Buddy Gillespie ITIL Certified (8)

Healthcare Highlights: HIT Drivers and Trends
Healthcare Highlights: HIT Drivers and TrendsHealthcare Highlights: HIT Drivers and Trends
Healthcare Highlights: HIT Drivers and Trends
 
ITIL and Service Management
ITIL and Service ManagementITIL and Service Management
ITIL and Service Management
 
HITECH-Meaningful Use and the Benefits of the PMI and ITIL Relationship
HITECH-Meaningful Use and the Benefits of the PMI and ITIL RelationshipHITECH-Meaningful Use and the Benefits of the PMI and ITIL Relationship
HITECH-Meaningful Use and the Benefits of the PMI and ITIL Relationship
 
Electronic Medical Records and Meaningful Use
Electronic Medical Records and Meaningful UseElectronic Medical Records and Meaningful Use
Electronic Medical Records and Meaningful Use
 
Can HIEs Really Achieve Financial Sustainability: A Case Study and Discussion...
Can HIEs Really Achieve Financial Sustainability: A Case Study and Discussion...Can HIEs Really Achieve Financial Sustainability: A Case Study and Discussion...
Can HIEs Really Achieve Financial Sustainability: A Case Study and Discussion...
 
Meaningful Use Forecast: Cloud Computing and Disaster Preparedness
Meaningful Use Forecast: Cloud Computing and Disaster PreparednessMeaningful Use Forecast: Cloud Computing and Disaster Preparedness
Meaningful Use Forecast: Cloud Computing and Disaster Preparedness
 
Mobility Management in Healthcare: MDM, BYOD, mHealth
Mobility Management in Healthcare: MDM, BYOD, mHealthMobility Management in Healthcare: MDM, BYOD, mHealth
Mobility Management in Healthcare: MDM, BYOD, mHealth
 
Pleasing Patients through Coordination of Services
Pleasing Patients through Coordination of ServicesPleasing Patients through Coordination of Services
Pleasing Patients through Coordination of Services
 

Recently uploaded

How many patients does case series should have In comparison to case reports.pdf
How many patients does case series should have In comparison to case reports.pdfHow many patients does case series should have In comparison to case reports.pdf
How many patients does case series should have In comparison to case reports.pdf
pubrica101
 
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
rajkumar669520
 
POLYCYSTIC OVARIAN SYNDROME (PCOS)......
POLYCYSTIC OVARIAN SYNDROME (PCOS)......POLYCYSTIC OVARIAN SYNDROME (PCOS)......
POLYCYSTIC OVARIAN SYNDROME (PCOS)......
Ameena Kadar
 
The Docs PPG - 30.05.2024.pptx..........
The Docs PPG - 30.05.2024.pptx..........The Docs PPG - 30.05.2024.pptx..........
The Docs PPG - 30.05.2024.pptx..........
TheDocs
 
Deepfake Detection_Using Machine Learning .pptx
Deepfake Detection_Using Machine Learning .pptxDeepfake Detection_Using Machine Learning .pptx
Deepfake Detection_Using Machine Learning .pptx
mahalsuraj389
 
Immunity to Veterinary parasitic infections power point presentation
Immunity to Veterinary parasitic infections power point presentationImmunity to Veterinary parasitic infections power point presentation
Immunity to Veterinary parasitic infections power point presentation
BeshedaWedajo
 
Medical Technology Tackles New Health Care Demand - Research Report - March 2...
Medical Technology Tackles New Health Care Demand - Research Report - March 2...Medical Technology Tackles New Health Care Demand - Research Report - March 2...
Medical Technology Tackles New Health Care Demand - Research Report - March 2...
pchutichetpong
 
HEAT WAVE presented by priya bhojwani..pptx
HEAT WAVE presented by priya bhojwani..pptxHEAT WAVE presented by priya bhojwani..pptx
HEAT WAVE presented by priya bhojwani..pptx
priyabhojwani1200
 
Navigating the Health Insurance Market_ Understanding Trends and Options.pdf
Navigating the Health Insurance Market_ Understanding Trends and Options.pdfNavigating the Health Insurance Market_ Understanding Trends and Options.pdf
Navigating the Health Insurance Market_ Understanding Trends and Options.pdf
Enterprise Wired
 
Navigating Healthcare with Telemedicine
Navigating Healthcare with  TelemedicineNavigating Healthcare with  Telemedicine
Navigating Healthcare with Telemedicine
Iris Thiele Isip-Tan
 
A Community health , health for prisoners
A Community health  , health for prisonersA Community health  , health for prisoners
A Community health , health for prisoners
Ahmed Elmi
 
Performance Standards for Antimicrobial Susceptibility Testing
Performance Standards for Antimicrobial Susceptibility TestingPerformance Standards for Antimicrobial Susceptibility Testing
Performance Standards for Antimicrobial Susceptibility Testing
Nguyễn Thị Vân Anh
 
Leading the Way in Nephrology: Dr. David Greene's Work with Stem Cells for Ki...
Leading the Way in Nephrology: Dr. David Greene's Work with Stem Cells for Ki...Leading the Way in Nephrology: Dr. David Greene's Work with Stem Cells for Ki...
Leading the Way in Nephrology: Dr. David Greene's Work with Stem Cells for Ki...
Dr. David Greene Arizona
 
GLOBAL WARMING BY PRIYA BHOJWANI @..pptx
GLOBAL WARMING BY PRIYA BHOJWANI @..pptxGLOBAL WARMING BY PRIYA BHOJWANI @..pptx
GLOBAL WARMING BY PRIYA BHOJWANI @..pptx
priyabhojwani1200
 
VERIFICATION AND VALIDATION TOOLKIT Determining Performance Characteristics o...
VERIFICATION AND VALIDATION TOOLKIT Determining Performance Characteristics o...VERIFICATION AND VALIDATION TOOLKIT Determining Performance Characteristics o...
VERIFICATION AND VALIDATION TOOLKIT Determining Performance Characteristics o...
Nguyễn Thị Vân Anh
 
Secret Tantric VIP Erotic Massage London
Secret Tantric VIP Erotic Massage LondonSecret Tantric VIP Erotic Massage London
Secret Tantric VIP Erotic Massage London
Secret Tantric - VIP Erotic Massage London
 
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Guillermo Rivera
 
CANCER CANCER CANCER CANCER CANCER CANCER
CANCER  CANCER  CANCER  CANCER  CANCER CANCERCANCER  CANCER  CANCER  CANCER  CANCER CANCER
CANCER CANCER CANCER CANCER CANCER CANCER
KRISTELLEGAMBOA2
 
India Clinical Trials Market: Industry Size and Growth Trends [2030] Analyzed...
India Clinical Trials Market: Industry Size and Growth Trends [2030] Analyzed...India Clinical Trials Market: Industry Size and Growth Trends [2030] Analyzed...
India Clinical Trials Market: Industry Size and Growth Trends [2030] Analyzed...
Kumar Satyam
 
Telehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptxTelehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptx
The Harvest Clinic
 

Recently uploaded (20)

How many patients does case series should have In comparison to case reports.pdf
How many patients does case series should have In comparison to case reports.pdfHow many patients does case series should have In comparison to case reports.pdf
How many patients does case series should have In comparison to case reports.pdf
 
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
 
POLYCYSTIC OVARIAN SYNDROME (PCOS)......
POLYCYSTIC OVARIAN SYNDROME (PCOS)......POLYCYSTIC OVARIAN SYNDROME (PCOS)......
POLYCYSTIC OVARIAN SYNDROME (PCOS)......
 
The Docs PPG - 30.05.2024.pptx..........
The Docs PPG - 30.05.2024.pptx..........The Docs PPG - 30.05.2024.pptx..........
The Docs PPG - 30.05.2024.pptx..........
 
Deepfake Detection_Using Machine Learning .pptx
Deepfake Detection_Using Machine Learning .pptxDeepfake Detection_Using Machine Learning .pptx
Deepfake Detection_Using Machine Learning .pptx
 
Immunity to Veterinary parasitic infections power point presentation
Immunity to Veterinary parasitic infections power point presentationImmunity to Veterinary parasitic infections power point presentation
Immunity to Veterinary parasitic infections power point presentation
 
Medical Technology Tackles New Health Care Demand - Research Report - March 2...
Medical Technology Tackles New Health Care Demand - Research Report - March 2...Medical Technology Tackles New Health Care Demand - Research Report - March 2...
Medical Technology Tackles New Health Care Demand - Research Report - March 2...
 
HEAT WAVE presented by priya bhojwani..pptx
HEAT WAVE presented by priya bhojwani..pptxHEAT WAVE presented by priya bhojwani..pptx
HEAT WAVE presented by priya bhojwani..pptx
 
Navigating the Health Insurance Market_ Understanding Trends and Options.pdf
Navigating the Health Insurance Market_ Understanding Trends and Options.pdfNavigating the Health Insurance Market_ Understanding Trends and Options.pdf
Navigating the Health Insurance Market_ Understanding Trends and Options.pdf
 
Navigating Healthcare with Telemedicine
Navigating Healthcare with  TelemedicineNavigating Healthcare with  Telemedicine
Navigating Healthcare with Telemedicine
 
A Community health , health for prisoners
A Community health  , health for prisonersA Community health  , health for prisoners
A Community health , health for prisoners
 
Performance Standards for Antimicrobial Susceptibility Testing
Performance Standards for Antimicrobial Susceptibility TestingPerformance Standards for Antimicrobial Susceptibility Testing
Performance Standards for Antimicrobial Susceptibility Testing
 
Leading the Way in Nephrology: Dr. David Greene's Work with Stem Cells for Ki...
Leading the Way in Nephrology: Dr. David Greene's Work with Stem Cells for Ki...Leading the Way in Nephrology: Dr. David Greene's Work with Stem Cells for Ki...
Leading the Way in Nephrology: Dr. David Greene's Work with Stem Cells for Ki...
 
GLOBAL WARMING BY PRIYA BHOJWANI @..pptx
GLOBAL WARMING BY PRIYA BHOJWANI @..pptxGLOBAL WARMING BY PRIYA BHOJWANI @..pptx
GLOBAL WARMING BY PRIYA BHOJWANI @..pptx
 
VERIFICATION AND VALIDATION TOOLKIT Determining Performance Characteristics o...
VERIFICATION AND VALIDATION TOOLKIT Determining Performance Characteristics o...VERIFICATION AND VALIDATION TOOLKIT Determining Performance Characteristics o...
VERIFICATION AND VALIDATION TOOLKIT Determining Performance Characteristics o...
 
Secret Tantric VIP Erotic Massage London
Secret Tantric VIP Erotic Massage LondonSecret Tantric VIP Erotic Massage London
Secret Tantric VIP Erotic Massage London
 
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
 
CANCER CANCER CANCER CANCER CANCER CANCER
CANCER  CANCER  CANCER  CANCER  CANCER CANCERCANCER  CANCER  CANCER  CANCER  CANCER CANCER
CANCER CANCER CANCER CANCER CANCER CANCER
 
India Clinical Trials Market: Industry Size and Growth Trends [2030] Analyzed...
India Clinical Trials Market: Industry Size and Growth Trends [2030] Analyzed...India Clinical Trials Market: Industry Size and Growth Trends [2030] Analyzed...
India Clinical Trials Market: Industry Size and Growth Trends [2030] Analyzed...
 
Telehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptxTelehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptx
 

Sustainability of HIEs under CyberSecurity

  • 1. Sustainability of HIEs under Cyber Security The CERT Symposium on Cyber Security Incident Management for Health Information Exchanges Carnegie Mellon University's Posner Center Pittsburgh, Pennsylvania June 26, 2013
  • 2. William “Buddy” Gillespie Chair Business, Health Outcomes & HIE Committee, PAeHI Director of HealthCare Solutions Distributed Systems Services (DSS) wgillespie@dsscorp.com
  • 3. Sustainability of HIEs under Cyber Security Agenda • HIE Overview • The Problem • Concerns/Trends/HIMSS Survey • Guidelines • Architecture • Medical Devices/Robotic Surgery • Best Practices • Future
  • 4. HIE - Seven Sustainability Strategies 1 • Innovative stakeholder negotiations 2 • Building the right relations hospitals & payers 3 • Physician adoption as driver of sustainability 4 • Innovation to bring payers/providers together 5 • Innovative sources for fee income 6 • Stake Holders drive healthcare transformation 7 • Cyber Security Best Practice
  • 5. Health Information Exchange Services Provided Majority Provide • Clinical messaging and Inquiry (CCD) • PH Dept. reportable conditions or Immunization Registry Most Provide • Had or planning eRX, orders, physician workflow tools • Six of 11 had or planning low-cost, Web-based certified EHRS that meets Meaningful Use Unique Services • INHS (WA) offers shared IT services to 38 hospitals plus majority of physicians; others use Virtual Private Network • MiHIN Resource Services plans to implement 7 sub- state HIEs over 18 months.
  • 6.
  • 7. HIE Cyber Security -The Problem “Not only do medical EHR systems themselves pose security risks, but the movement towards making patient data available wherever they may access medical services, implemented through participation in health information exchanges (HIEs), exacerbates the level of risk by posing additional threat vulnerabilities. HIEs face funding challenges due to the fact that they lack clear-cut and profitable business models, and yet federal grants and deadlines maintain a level of time pressure for implementing these systems that do not allow for thorough considerations of security………..” Doug Pollack, strategy officer at ID Experts, responsible for strategy and innovation including prevention analysis and response services. As a veteran in the technology industry, he has over 25 years of experience in computer systems, software, and security concerns focusing on creating successful new products in new emerging markets.
  • 8. HIE Cyber Security -The Problem HIE
  • 9. HIE Cyber Security - Comparing HIE Models & Cyber Security Integrated delivery networks (IDNs) •Organized by one Institution •Hospital to connect its physicians & provider partners & ensures that hospitals and physicians can participate in Meaningful Use Incentive •Costs are absorbed by Institution & Hospital vendors set up networks •Examples: Pinnacle Health System and Doylestown Hospital Community/Regional HIE •Organized around one or more medical referral regions with a multi-stakeholder governing body •Fees are paid by the stakeholders based on benefits received & startup funding coming from key stakeholders or outside funding sources (grants) •Examples: Geisinger’s KeyHIE and UPMC’s HIE are blended IDN/Regional HIEs. State-level HIE • State geographic boundaries • Responsible for addressing barriers to HIE adoption around privacy and security, standards, and legal issues with bordering states • Funded by federal government to include state agencies such as Medicaid and Public Health • Example: Designation of a state-level HIE in Pennsylvania
  • 10. PAeHI Research Studies and White Papers Establishing widespread adoption of electronic health records and electronic prescribing in Pennsylvania (2008) Ensuring privacy and security of Health Information Exchange in Pennsylvania (2009) Building a Sustainable Model for Health Information Exchange in Pennsylvania (2009) Financing Research and Framework Development for a Health Information Exchange (2010) 10 paehi.org
  • 11. HIE Cyber Security – Internet Usage • In 1995, 16 million users (0.4%) • In 2010, 1.6 billion users (23.5%)
  • 12. HIE Cyber Attack - Trends • Increasing sophistication • Decreasing costs • Increasing attack frequency • Difficulties in patching systems • Increasing network connections, dependencies, and trust relationships
  • 13. HIE Cyber Security – Top Concerns • Mobile Devices - BYOD • Medical Devices/Robotic Surgery • HIPAA & BAAs • Internal & External Breaches • Data Leakage • Limits of Technology & Inadequate Security Systems • Funding • Patient’s Lack of Confidence • Third Parties-Vendors • Remote Connections
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. HIE Cyber Security - Concepts of Information Assurance • Confidentiality (privacy) • Integrity (quality, accuracy, relevance) • Availability (accessibility)
  • 20. HIE Cyber Security – ONC Guidelines • New privacy and security guidelines--aimed at protecting the vast amount of healthcare information transmitted by state Health Information Exchanges--are now in place. • HIEs are networks intended to help states manage the electronic exchange of health information among health care providers and hospitals within their states and across state lines. • Privacy and security policies are required as a condition of accepting part of the $550 million federal grant money funding the development of state-based HIEs. “The guidelines, issued by the Office of the National Coordinator for Health IT (ONC), provide a common set of "rules of the road" designed to build confidence in the system on both the provider and patient level”…….. ONC
  • 21. HIE Cyber Security – ONC Guidelines • Under the new guidelines, state HIE grantees are required to develop privacy and security policies to address each of the fair information practice principles as outlined by ONC. • The principles include individual access to information; the right to correct errors; openness and transparency; collection, use and disclosure limitations; security safeguards; data quality and integrity; individual choice; and accountability.
  • 22. HIE Cyber Security – ONC Guidelines • The ONC also noted that there was no "one size fits all" approach when developing policy for HIEs. – For example, some state HIEs merely serve as information conduits, ensuring the secure exchange of identifiable health information among health care providers, without accessing or storing any of that data. This type of HIE doesn't have to worry about data quality or providing individuals access to copies of their health information or to have errors corrected or noted. – However, state HIEs that "store, assemble, or aggregate" identifiable health information are required to develop policies to address all of the fair information practices, including data quality, individual access and the right to correct errors
  • 23. HIE Cyber Security – ONC Guidelines • If an HIE's current privacy and security policies don't comply with the new requirements and guidance, they have to be rewritten and a timeline for making those changes given to the ONC. • The new requirements are consistent with the recommendations developed and issued by the Privacy and Security Tiger Team of the Federal Health IT Policy Committee.
  • 24. HIE Cyber Security – Privacy & Security Policies • All of the information that passes through the HIE is password protected and encrypted at its source using state of the art tools to protect the transmission and security of the data. • Access to the network is monitored and restricted to only those qualified medical professionals who have demonstrated a need to know the requested information.
  • 25. HIE Cyber Security – Security Architecture • The secure exchange of electronic health information is important to the development of electronic health records (EHRs) and to the improvement of the U.S. healthcare system. • While the U.S. healthcare system is widely recognized as one of the most clinically advanced in the world, costs continue to rise, and often preventable medical errors occur. • Health information technology (HIT), especially the development of electronic health records for use in both inpatient and ambulatory care settings, has the potential for providing reliable access to health information and thereby improving the healthcare system. However, the prospect of storing, moving, and sharing health information in electronic formats raises new challenges on how to ensure that the data is adequately protected.
  • 26. HIE Cyber Security – NHIN Security Architecture • Protecting electronic patient health information is crucial to developing systems and structures that support the exchange of that information among healthcare providers, payers, and consumers using Health Information Exchanges (HIEs). • As noted in the Summary of the Nationwide Health Information Network (NHIN) report from the Office of the National Coordinator, "An important core competency of the HIE is to maintain a trusting and supportive relationship with the organizations that provide data to, and retrieve data from, one another through the HIE. The trust requirement is met through a combination of legal agreements, advocacy, and technology for ensuring meaningful information interchange in a way that has appropriate protections."
  • 27. HIE Cyber Security – NIST Security Architecture • NIST published "Security Architecture Design Process for Health Information Exchanges (HIEs) (NISTIR 7497)" in September 2010, to provide a systematic approach to designing a technical security architecture for the exchange of health information that leverages common government and commercial practices and that demonstrates how these practices can be applied to the development of HIEs. • The publication assists organizations in ensuring that data protection is adequately addressed throughout the system development life cycle, and that these data protection mechanisms are applied when the organization develops technologies that enable the exchange of health information.
  • 28. HIE Cyber Security – Security Architecture • The operating model outlined in the NIST publication will help organizations that are implementing HIEs to: – Understand major regulations and business drivers. – Identify cross-organizational enabling services. – Define supporting business processes (for each service). – Develop notional architectures (as a blueprint to support services, processes, and the selection of technical solutions). – Select technical solutions.
  • 29. HIE Cyber Security – Medical Devices/Robotic Surgery • Summary of Problem and Scope: – Many medical devices contain configurable embedded computer systems that can be vulnerable to cyber security breaches. – In addition, as medical devices are increasingly interconnected, via the Internet, hospital networks, other medical device, and smartphones, there is an increased risk of cyber security breaches, which could affect how a medical device operates
  • 30. HIE Cyber Security – Medical Devices/Robotic Surgery • General Principles – Manufacturers should develop a set of security controls to assure medical device cyber security to maintain information confidentiality, integrity, and availability.
  • 31. HIE Cyber Security – Medical Devices - FDA • On June 13, 2013, in response to increased reports of computer viruses and other cyber security breaches concerning medical devices and hospital networks, the Food and Drug Administration (FDA) issued a safety communication on cyber security for medical devices and hospital networks and a new draft guidance document, "Content of Premarket Submissions for Management of Cyber security in Medical Devices." – As software has become increasingly prevalent in medical devices, allowing for more sophisticated uses and networked connectivity, the cyber security risks for these devices also have increased. – Recognizing that these risks may impact device performance and safety, FDA clarified that device manufacturers are responsible for identifying and mitigating cyber security risks for their medical device products. – Although the new draft guidance makes clear that FDA expects device manufacturers to evaluate and address these issues for new devices going forward, questions remain as to the extent of manufacturers' obligations for cyber security risks affecting older devices, particularly with respect to discontinued devices that are still in use but are no longer supported by a device manufacturer.
  • 32. HIE Cyber Security – Medical Devices - FDA • FDA acknowledges that the extent of security controls will depend on the medical device, its use environment, and the risks presented to patients by a potential security breach, the draft guidance includes several general recommendations. – Manufacturers are encouraged to justify, in their submissions, the security controls chosen, including the following: • limiting access to trusted users only, particularly for life-sustaining devices or devices that could be directly connected to hospital networks; • ensuring the trusted content of software by restricting software and firmware updates to authenticated code, using systematic procedures for authorized users to download the manufacturer's software and firmware, and ensuring secure data transfer to and from the device; • using "fail safe" modes to maintain a device's critical functionality, even when the device's security has been compromised.
  • 33. HIE Cyber Security – Medical Devices - FDA • FDA recommends that manufacturers include the following with their submissions: – Hazard analysis, mitigations, and design considerations to identify and control cyber security risks; a traceability matrix linking actual cyber security controls to the risks considered; – A systematic plan for providing validated updates and patches to operating systems or software to update the protections; – Documentation to demonstrate that the device will be provided free of malware to purchasers and users; and – Instructions for use and specifications related to antivirus software and/or firewall use appropriate for the device and its use environment.
  • 34. HIE Cyber Security – Medical Devices • Cyber Security risk analysis and management plan as part of the risk analysis required by 21 CFR 820.30(g): • Identification of assets, threats, and vulnerabilities; • Impact assessment of the threats and vulnerabilities on device functionality; • Assessment of the likelihood of a threat and of a vulnerability being exploited; • Determination of risk levels and suitable mitigation strategies; • Residual risk assessment and risk acceptance criteria.
  • 35. HIE Cyber Security – FDA Recommendations for HIEs • Restricting unauthorized access to the network and networked medical devices. • Making certain appropriate antivirus software and firewalls are up-to-date. • Monitoring network activity for unauthorized use.
  • 36. HIE Cyber Security – FDA Recommendations for HIEs • Protecting individual network components through routine and periodic evaluation, including updating security patches and disabling all unnecessary ports and services. • Contacting the specific device manufacturer if you think you may have a cyber security problem related to a medical device. If you are unable to determine the manufacturer or cannot contact the manufacturer, the FDA and DHS ICS-CERT may be able to assist in vulnerability reporting and resolution. • Developing and evaluating strategies to maintain critical functionality during adverse conditions.
  • 37. HIE Cyber Security – FDA Recommendations for HIEs • Protecting individual network components through routine and periodic evaluation, including updating security patches and disabling all unnecessary ports and services. • Contacting the specific device manufacturer if you think you may have a cyber security problem related to a medical device. If you are unable to determine the manufacturer or cannot contact the manufacturer, the FDA and DHS ICS-CERT may be able to assist in vulnerability reporting and resolution. • Developing and evaluating strategies to maintain critical functionality during adverse conditions.
  • 38. HIE Cyber Security – ICS-CERT • What is ICS-CERT? – The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) provides a control system security focus in collaboration with US-CERT to: • Conduct vulnerability and malware analysis • Provide onsite support for incident response and forensic analysis • Provide situational awareness in the form of actionable intelligence • Coordinate the responsible disclosure of vulnerabilities/mitigations • Share and coordinate vulnerability information and threat analysis through information products and alerts.
  • 39. HIE Cyber Security – Best Practices • Best Practices for Technology Environment – Configuration Management – Software Maintenance – Operating Maintenance • Mobile Device Management (BYOD) • Security Culture • Backup and DR • Checklists and ITSM for all Elements
  • 40. HIE Cyber Security – Best Practices • Passwords & Strong Authentication • Anti-Virus Software • Firewall(s) • Controlled Access to PHI • Controlled Physical Access • Limit Network Access • Plan for the Unexpected
  • 41. HIE Cyber Security – The Next Frontier • Accountable Care Organizations (ACOs) • Direct-HISPs • Cloud Hosting • Meaningful Use-Stage 2 and 3 • HIPAA Omnibus Bill
  • 42. HIE Cyber Security – Expert Opinion Camillla Hull Brown, Principal, Strategies for Tomorrow, Inc. (sftvision.com) “Cyber Security opens the doors for HIEs to cross geographic boundaries if they successfully address Security issues in the minds of users and participating organizations. Combined with data exchange standards, this has the potential for some HIEs to expand nationally establishing sustainability through volume. Private, local or regional HIEs can thrive by accessing additional data from the national HIEs while providing services tailored to the needs of the local system or region. Put remote devices in the hands of clinicians and patients, and the benefits can be exponential. It's the think global, act local concept”.
  • 43. HIE Cyber Security – Reference Sites HHS Office for Civil Rights website (http://www.hhs.gov/ocr/privacy/hipaa/understanding/) NIST 800 Series Special Publications (http://csrc.nist.gov/publications/PubsSPs.html) In particular: • NIST SP 800-36 Guide to Selecting Information Technology Security Products • NIST SP 800-53 Recommended Security Controls for Federal Information Systems and Organizations • NIST SP 800-66 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule • NIST SP 800-88 Guidelines for Media Sanitization • NIST SP 800-111 Guide to Storage Encryption Technologies for End User Devices • NIST SP 800-114 User's Guide to Securing External Devices for Telework and Remote Access • NIST SP 800-124 Guidelines on Cell Phone and PDA Security 44
  • 44. HIE Cyber Security – Reference Sites CYBER SECURITY Guide The protection of data and systems in networks that connect to the Internet 10 Best Practices http://nyehealth.org/wp-content/uploads/2012/07/ONC_Cyber- Security-Guide-V-1.0.pdf
  • 45. Click to edit Master title style Thank youThank you Healthcare Solutions & Overview William “Buddy” Gillespie www.dsscorp.com wgillespie@dsscorp.com Discussion